Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 16:30
Behavioral task
behavioral1
Sample
8fa0bd538f66f8892f769a6d35d7e856.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8fa0bd538f66f8892f769a6d35d7e856.exe
Resource
win10v2004-20231222-en
General
-
Target
8fa0bd538f66f8892f769a6d35d7e856.exe
-
Size
2.9MB
-
MD5
8fa0bd538f66f8892f769a6d35d7e856
-
SHA1
e9dec00d893f427977eca2c5fe1590e43ff01dde
-
SHA256
116c0dc015c49f08652117192a1cad1b508c5fbe786bf912ebd575deaaaa27e2
-
SHA512
2f1b470935ab83124f4bf74ec717bc83841ce2dfeb2cbd84a213a74020ae059548fa7d8b92d3b80c220ecd1428019aa9b100f16f79f017530f85cebefc808c91
-
SSDEEP
49152:lqQ+qR05iK0DtYJpAF2LiQZMFeMaP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:lgBsKo+pAQLDLjgg3gnl/IVUs1jePs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3280 8fa0bd538f66f8892f769a6d35d7e856.exe -
Executes dropped EXE 1 IoCs
pid Process 3280 8fa0bd538f66f8892f769a6d35d7e856.exe -
resource yara_rule behavioral2/memory/5112-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00070000000231f0-11.dat upx behavioral2/memory/3280-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5112 8fa0bd538f66f8892f769a6d35d7e856.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5112 8fa0bd538f66f8892f769a6d35d7e856.exe 3280 8fa0bd538f66f8892f769a6d35d7e856.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 3280 5112 8fa0bd538f66f8892f769a6d35d7e856.exe 85 PID 5112 wrote to memory of 3280 5112 8fa0bd538f66f8892f769a6d35d7e856.exe 85 PID 5112 wrote to memory of 3280 5112 8fa0bd538f66f8892f769a6d35d7e856.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe"C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exeC:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641KB
MD5df4b4753d622d1906b8f68c7003f8634
SHA111ae274a4b8a4607166e3a8454f35cffa210d5b3
SHA256d97cf38db248776280f8b3a305428423b32e6a5fb9d0460ce1bc2c74354950ff
SHA512b4b66322f126cb2d490709cec40e23b6551ffb4b539011cdd95e4a9609fab13cd1d0bf80f5957cc6dba02867c13d5c0df1fcc0a8fd3f3b903757552c73801874